diff --git a/Documentation/Report.rst b/Documentation/Report.rst
index 3365712bbf741bc19f36691c7a30035619d42b9e..c4b79b5851654bae8103febd17109803ab455b83 100644
--- a/Documentation/Report.rst
+++ b/Documentation/Report.rst
@@ -1412,17 +1412,17 @@ Run a php function defined in an external script.
 * The second argument (here called $qfq) is an object which acts as an interface to QFQ functionality.
 * The script has access to the following qfq functions using this interface:
    * $qfq::apiCall($method, $url, $data = [], $header = [], $timeout = 5)
-      * string $method PUT/POST/GET/DELETE
+      * string $method can be PUT/POST/GET/DELETE
       * string $url
-      * array $data json string, will be added as GET parameters or as POST fields respectively.
-      * array $header of the form ['Content-type: text/plain', 'Content-length: 100']
-      * int $timeout number of seconds to wait until call is aborted.
+      * array $data a json string which will be added as GET parameters or as POST fields respectively.
+      * array $header is of the form ['Content-type: text/plain', 'Content-length: 100']
+      * int $timeout is the number of seconds to wait until call is aborted.
    * $qfq::getVar($key, $useStores = 'FSRVD', $sanitizeClass = '', &$foundInStore = '', $typeMessageViolate = 'c')
-      * string $key name of qfq variable
-      * string $useStores Stores in which variable is searched (in order from left to right). see :ref:`store`.
-      * string $sanitizeClass see :ref:`sanitize-class`
+      * string $key is the name of qfq variable
+      * string $useStores are the stores in which variable is searched (in order from left to right). see :ref:`store`.
+      * string $sanitizeClass (see :ref:`sanitize-class`)
       * string $foundInStore is filled with the name of the store in which the variable was found.
-      * string $typeMessageViolate what to return if the sanitize class was violated:
+      * string $typeMessageViolate defines what to return if the sanitize class was violated:
          * 'c': return '!!<sanitize class>!!'
          * '0': return '0'
          * 'e': return ''